Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
d3f9a41b2c2926f37f7169345c8bda51_JaffaCakes118.dll
Resource
win7-20240903-en
Target
d3f9a41b2c2926f37f7169345c8bda51_JaffaCakes118
Size
57KB
MD5
d3f9a41b2c2926f37f7169345c8bda51
SHA1
b2b63ac00fd5610bc7606e8c360917788e28275c
SHA256
bbd628c5ceb38cbd39f85cbc7b1b2c2c4dbc733150f2d7ab35e208e2fab80427
SHA512
74bc39ceb273bfcd34285b2943049d216981a85c165ed25fcf62e56b3b46eb4514f42f48b738d859c57a169d8c929dd06788618d645f944459fdb3ff8697fb82
SSDEEP
1536:XJrxTQHRslEMf8vkJ58/8H41JsDoKr5JC90cb:XJdTQVMlJjHsJ+oKr5Mn
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegFlushKey
RegQueryValueExA
DeleteCriticalSection
lstrcmpiA
LeaveCriticalSection
EnterCriticalSection
lstrcpyW
WideCharToMultiByte
lstrlenW
GetCurrentProcessId
VirtualProtect
VirtualQuery
FlushInstructionCache
GetCurrentProcess
lstrlenA
InitializeCriticalSection
CloseHandle
CreateEventA
DisableThreadLibraryCalls
WaitForSingleObject
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
FreeLibrary
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetSystemDirectoryA
lstrcmpA
DebugBreak
HeapReAlloc
HeapFree
UnmapViewOfFile
MapViewOfFile
SetLastError
GetCurrentThreadId
ReleaseMutex
CreateMutexA
LocalFree
CreateFileMappingA
SizeofResource
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
VariantChangeTypeEx
VariantInit
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VariantClear
GetWindowThreadProcessId
GetFocus
GetWindowTextW
SendMessageA
SetWindowsHookExA
UnhookWindowsHookEx
EnumWindows
DefWindowProcW
CallWindowProcW
CallWindowProcA
SetWindowLongA
SetWindowLongW
IsWindowUnicode
GetWindowLongA
GetWindowLongW
CharNextA
GetKeyboardType
FindWindowExA
MapWindowPoints
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
DefWindowProcA
CreateWindowExA
CallNextHookEx
GetKeyState
SetWindowTextA
SetFocus
SetWindowTextW
GetPropA
SetPropA
RemovePropA
PostMessageA
IsWindow
RegisterWindowMessageA
GetWindow
GetClassNameA
GetParent
PeekMessageA
DestroyWindow
UnregisterClassA
WSACancelAsyncRequest
WSAStartup
WSAAsyncGetHostByName
WSACleanup
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ